Enhanced Data Access Control of Cooperative Environment used for DMU Based Design
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Enhanced Data Access Control of Cooperative Environment used for DMU Based Design

Authors: Wei Lifan, Zhang Huaiyu, Yang Yunbin, Li Jia

Abstract:

Through the analysis of the process digital design based on digital mockup, the fact indicates that a distributed cooperative supporting environment is the foundation conditions to adopt design approach based on DMU. Data access authorization is concerned firstly because the value and sensitivity of the data for the enterprise. The access control for administrators is often rather weak other than business user. So authors established an enhanced system to avoid the administrators accessing the engineering data by potential approach and without authorization. Thus the data security is improved.

Keywords: access control, DMU, PLM, virtual prototype.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1075711

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1428

References:


[1] Xiong Guangleng, LI Bohu, Chai Xudong, "Virtual Prototyping Technology". Acta Simulata Systematica Sinica, vol.13, no.1, pp. 114-117, 2001.
[2] Ting Huang, C.W. Kong, H.L. Guo, Andrew Baldwin,Heng Li, "A virtual prototyping system for simulating construction processes", Automation in Construction, vol.16 , pp576-585, 2007.
[3] Qing Shen, Michael Grafe, "To support multidisciplinary communication in VR-based virtual prototyping of mechatronic systems, Advanced Engineering Informatics", vol.21, pp201-209, 2007 .
[4] Li Bohu, Chai Xudong and etc., "Research and Practice on Complex Products Virtual Prototype Technology", Measurement & Control Technology, vol.20, no.11, pp. 1-6, 2001.
[5] Li Bohu, Chai Xudong, "Virtual Prototyping Engineering for Complex Product ", Computer Intergratated Manufacturing Systems, vol.8, no.9, pp. 678-683, 2002.
[6] Sandhu R., "Role-based access control", Advances in Computers, vol.1, pp46-49, 1998.
[7] Zhu Hong, Feng Yucai, Wu Yongying, "Secure Administration Based on User Role", JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY, vol.28, no.4, pp23-25, 2000.
[8] Gou Jihua, Peng Yinhong, Ruan Xueyu, "Modeling technique of PDM implement", CAD/CAM, vol.6, pp12-15, 1999.
[9] Zhou Yanfei, Ma Ben, Wang Linbo, Yuan Puji, "User Access Control Modeling for PDM Systems", Journal of Data Acquisition & Processing, vol.4, no.12, pp385-389, 2002.
[10] Wei Lifan, Zhang Haiyu, Jia Li, "A Bussiness Intergration Model Used In Collaborative Engineering Design", in 2011 International Conference on Advanced Design and Manufacturing Engineering, GuangZhou, pp162-166.